{"id":1822,"date":"2005-07-01T00:00:00","date_gmt":"2005-07-01T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/07\/01\/firms-still-neglecting-pda-security\/"},"modified":"2021-12-30T11:40:03","modified_gmt":"2021-12-30T11:40:03","slug":"firms-still-neglecting-pda-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/07\/01\/firms-still-neglecting-pda-security\/","title":{"rendered":"Firms still neglecting PDA security"},"content":{"rendered":"<p>Almost a third of companies do not treat PDA security as seriously as laptop security, according to a survey by Quocirca.  The report found that many firms place less emphasis on handheld security or leave it up to users.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>However, two thirds of firms, typically those with more experience of mobile devices, implement basic security policies including offering a limited choice of devices.  Those with most advanced mobile usage deploy centralised software management that allows devices to be switched off remotely in case of loss or theft.  The survey found very few firms with large-scale PDA deployment.  &#8220;The vast majority of PDA use is in small pilots or limited numbers of users<\/p>\n<p>The big issue now is whether firms move to a strategy of being device-agnostic to have more flexibility,&#8221; said Quocirca analyst Dale Vile.  &#8220;There is a lot of loyalty to the BlackBerry but firms are realising that they probably need a bit more choice.  There is also a growing desire to understand how to pull together different wireless technologies such as GPRS, wireless Lans and 3G.&#8221;<\/p>\n<p>The biggest weakness in deploying laptops was seen as user vigilance, with loss and theft the greatest concern.  Most companies indicated that well communicated security policies were key to reducing this risk.  While firms that embark on PDA pilots mostly cite security and cost as key concerns, these issues give way to concerns over interoperability and compatibility as experience of wireless devices increases.  <\/p>\n<p>Cost and complexity of device management was a key concern for over 50 per cent of the respondents, and the survey found that this concern does not diminish with increased experience of the technology.  The good news is that security fears diminished with greater experience, but increased PDA use upped the need for user support and training.<\/p>\n<p>The survey, conducted on behalf of Orange, was based on 2,853 interviews with IT professionals.<\/p>\n<p>http:\/\/www.vnunet.com\/vnunet\/news\/2139186\/pda-security-mobile<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1822","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1822"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1822\/revisions"}],"predecessor-version":[{"id":4309,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1822\/revisions\/4309"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}